Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll
Resource
win10v2004-20240802-en
General
-
Target
d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll
-
Size
8KB
-
MD5
2f3879016983b0ac4f453d061161f7ad
-
SHA1
d076d26b6a02c114d90a4dec94a062c2182b80f6
-
SHA256
d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea
-
SHA512
2b1df3afd43653e593b7de5a2f94806edd0c7cfe349d30a0b39c83e333cee850c89db381f482bdda66f2bcacc9e1e5c06bdaf85f719095195676ca527dc5e2d3
-
SSDEEP
192:Uh4SFyvWohE5xf6YUBSL63SUJqtMblWN:UO+ohE2B13NJqtM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\satornas.dll rundll32.exe File created C:\Windows\SysWOW64\satornas.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2544 2384 rundll32.exe 30 PID 2384 wrote to memory of 2544 2384 rundll32.exe 30 PID 2384 wrote to memory of 2544 2384 rundll32.exe 30 PID 2384 wrote to memory of 2544 2384 rundll32.exe 30 PID 2384 wrote to memory of 2544 2384 rundll32.exe 30 PID 2384 wrote to memory of 2544 2384 rundll32.exe 30 PID 2384 wrote to memory of 2544 2384 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2544
-